Privacy Lies: Understanding How, When, and Why People Lie to Protect Their Privacy in Multiple Online Contexts

Size: px
Start display at page:

Download "Privacy Lies: Understanding How, When, and Why People Lie to Protect Their Privacy in Multiple Online Contexts"

Transcription

1 Privacy Lies: Understanding How, When, and Why People Lie to Protect Their Privacy in Multiple Online Contexts Shruti Sannon, Natalya N. Bazarova, Dan Cosley Cornell University Ithaca, NY, USA {ss3464, nnb8, ABSTRACT In this paper, we study online privacy lies: lies primarily aimed at protecting privacy. Going beyond privacy lenses that focus on privacy concerns or cost/benefit analyses, we explore how contextual factors, motivations, and individuallevel characteristics affect lying behavior through a 356- person survey. We find that statistical models to predict privacy lies that include attitudes about lying, use of other privacy-protective behaviors (PPBs), and perceived control over information improve on models based solely on selfexpressed privacy concerns. Based on a thematic analysis of open-ended responses, we find that the decision to tell privacy lies stems from a range of concerns, serves multiple privacy goals, and is influenced by the context of the interaction and attitudes about the morality and necessity of lying. Together, our results point to the need for conceptualizations of privacy lies and PPBs more broadly that account for multiple goals, perceived control over data, contextual factors, and attitudes about PPBs. Author Keywords Privacy; privacy-protective behaviors; deception; computermediated communication. ACM Classification Keywords K.4.1. Computers and Society: Public Policy Issues: Privacy. INTRODUCTION The proliferation of digital technologies has brought about an unprecedented amount of data collection and data sharing in people s everyday lives. People s concerns about sharing their personal information online have grown alongside these technological developments: in 2016, 74% of Americans believed that it is very important to be in control of personal information online, though only 9% of those surveyed believed they have such control [55]. In the absence of such control, people engage in a variety of privacyprotective behaviors (PPBs), from choosing to withhold personal information to complaining to regulators [63]. Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the United States Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only. CHI 2018, April 21 26, 2018, Montreal, QC, Canada 2018 Copyright is held by the owner/author(s). Publication rights licensed to ACM. ACM /18/04$ A less-studied PPB is to provide false information when faced with a concerning request: that is, to lie. This paper introduces the concept of privacy lies as the deliberate provision of false personal information to protect some facet of an individual s privacy. Such lies are fairly common: almost half of American teenagers have entered false information on their online profiles [37], while 40% of a sample of Internet users report lying to commercial websites [26]. Despite its prevalence, there is only limited understanding of this practice, including what motivates people to do it, how they engage in it, and to what effect. In particular, we see a need to consider factors beyond privacy concerns in order to understand privacy lies, as the well-known privacy paradox shows us that privacy concerns are often a poor indicator of people s actual behavior [6; 20; 47]. One such factor is context, which dynamically influences privacy goals, concerns, and behaviors [46; 51]. Situationspecific factors (such as an individual s current affect) can mediate the effect of pre-existing dispositional factors (such as general privacy concerns) on disclosure [32; 34], while making particular privacy-related needs and goals [1; 69] more or less salient. Another factor is that privacy lies are, after all, lies, and the literature on deception suggests that attitudes about lying are varied [43], and are likely to be important in understanding privacy lie decisions. To get a better sense of how contexts, goals, and attitudes affect decisions to tell privacy lies, we surveyed 356 participants about their privacy-related concerns, attitudes, and behaviors, and asked them about online interactions in which they had told privacy lies. Following other privacy research that broadly characterizes context as either interpersonal or commercial, we prompted people to share both (a) person lies, when individuals interact directly with humans using computer-mediated communication (for example, text messages, online chat rooms, gaming chats, and dating sites) and b) system lies, when individuals interact with technologies themselves (for example, web forms, mobile applications, games, virtual agents, and chatbots) without an immediately salient human recipient. Participants who had not told privacy lies were asked for their reasons for not engaging in this PPB. We found that attitudes about the morality, prevalence, and effectiveness of privacy lies, as well as perceptions of informational control and the use of other PPBs, were

2 significant predictors of lying frequency; in contrast, selfreported privacy concerns were insignificant when considering these other variables. While the model explained 35% of the variance, analyzing people s examples of privacy lies revealed that their decisions also varied based on their privacy goals, the nature of the request and the requestor, and whether they were interacting with a person or a system. Non-liars reasons were more categorical: they either saw no need to lie, or saw privacy lies as morally or practically bad. Our findings suggest the need for models to incorporate context-specific factors that indirectly measure privacy concerns, as well as the need to understand how PPBs can have multiple underlying motivations and serve a range of functions beyond protecting personal data. RELATED WORK Below we lay the groundwork for these claims, starting with an overview of research on PPBs, focusing on privacy lies. We then discuss individual characteristics beyond privacy concerns that might affect decisions about privacy lies. Finally, we outline work at the intersection of privacy and motivations, and how these may vary by context. An Overview of Online PPBs, Particularly Privacy Lies Studies of online PPBs typically focus on one of two broad contexts: commercial interactions with systems or websites, and interpersonal interactions on social media. A taxonomy of PPBs in commercial settings suggests people can respond to privacy concerns in three main ways: a) misrepresenting, obfuscating, or withholding information; b) taking private action against the site by removing their data or negative word-of-mouth; or c) taking public action by complaining to the company or third-party regulators [63]. Multiple PPBs are also possible during interpersonal interactions on social media, including using ambiguous language [11], lying to interaction partners [70], changing privacy settings to manage audiences [5], and deleting content entirely [11]. As with PPBs in general, privacy lies are generally examined with respect to either commercial or interpersonal situations. Research on lying in commercial contexts indicates that as privacy concerns increase, people are more likely to lie [60], and they weigh costs and benefits when deciding whether to truthfully disclose personal information [27]. Based on interviews, Poddar et al. identified three additional factors that influence consumers decision to falsify personal information in commercial Internet transactions: the necessity, invasiveness, and fairness of the request [54]. Privacy lying research also spans a number of interpersonal contexts, from dyadic exchanges with a chat partner (e.g., [71]) to broadcasting false information on social networking sites [21; 36]. As in commercial contexts, the likelihood of lying rises along with the level of privacy concerns [73]. Individual characteristics like gender can influence PPBs and the privacy concerns that drive them; for example, women are less likely to engage in PPBs despite having higher privacy concerns than men [58], and they engage in deception in online chatrooms mainly for safety reasons [71]. Individual Factors Beyond Privacy Concerns While privacy concerns can predict participants likelihood to falsify [60; 73] or withhold information [39], or to use privacy-enhancing tools, the relationship between privacy concerns and PPBs can be relatively weak [45]. More importantly, privacy concerns do not explain the whole story behind people s decision to tell privacy lies. Predictive models have not yet identified the sources of a large part of the variance for telling privacy lies. For instance, Jiang, Heng, and Choi s model to predict misrepresentation using privacy concerns and social rewards had limited predictive power (R 2 =.10) [30], which suggests a need to explore other factors that affect privacy lies in interpersonal contexts. Son and Kim also tried to predict misrepresentation using privacy concerns in a commercial context; they found a nonsignificant relationship, and suggested that factors other than privacy concerns must underlie misrepresentation in commercial settings [63]. Below, we discuss potential factors that prior research has identified as both promising and potentially measurable for predicting privacy lies. Informational control. A key aspect of privacy is the desire for informational control [19]. In 2015, 90% of American adults said it was important to be able to control what personal information was collected about them, and 93% said it was important to control who had access to it [40]. The ability to use privacy-enhancing technologies that allow people to control the flow of their information is positively associated with perceived control of data, which in turn mitigates privacy concerns [72]. This, however, can then lead to more self-disclosure [6] and risky behaviors [56]. Privacy literacy and experiences. Privacy knowledge and experience might also be useful for predicting privacy lies. Privacy literacy scales that rely on the number of actual PPBs people report performing in daily life, such as Turow and Hennessy s [65], serve both as proxies for knowledge and evidence of ability. Further, peoples past experiences with privacy violations may impact their privacy concerns [14] and predict PPBs [8]. For example, Facebook users who have personally experienced an invasion of privacy are more likely to engage in PPBs by changing their privacy settings [15]. This suggests the importance of examining privacyrelated experiences such as hearing privacy-related news or being a victim of a privacy violation [62]. General trust and willingness to disclose information. Personal privacy experiences might affect general trust of the Internet, i.e., the belief that institutional actors will protect and not disclose consumer data [65]. Similarly, an individual s general tendency to disclose personal information can predict PPBs [23] and helps understand disclosure decisions [38], including truthfulness. Attitudes about deception and lying online. Finally, because privacy lies are, well, lies, decisions about them are likely influenced by people s general attitudes about lying, such as its effectiveness and appropriateness for protecting privacy. Some people may see misrepresentation for the sake of

3 privacy as deceitful and be less likely to engage in it [9]. Similarly, protection motivation theory [41] suggests people are more likely to engage in protective behaviors they view as being effective, and perceptions of social norms can influence the frequency of many behaviors [4] including selfdisclosure [10]. Finally, research on location-sharing disclosures on social media suggests that the propensity to lie is a stable characteristic that can have a positive direct effect on online privacy concerns [49]. Taken together, this work suggests many individual characteristics beyond privacy concerns that are likely to affect decisions around privacy lies. Our first research question, then, is about whether these factors improve our ability to predict privacy lying behavior: RQ1: To what extent can individual-level characteristics beyond privacy concerns, including privacy-related views, actual privacy-related experiences, and attitudes about lying as a PPB, help predict privacy lies? Privacy Goals and Functions, in Context Most research on PPBs has studied privacy-protective behaviors through the lens of the privacy calculus, based on a weighing of the costs and benefits [16; 34]. For example, people weigh the perceived enjoyment they could derive from revealing information against the likelihood of a privacy violation when making disclosure decisions [35]. However, the considerations and weightings individuals bring to the privacy calculus are only partially determined by persistent, underlying traits such as general privacy attitudes [50]. The privacy in context perspective argues that privacy decisions and PPBs reflect contextual interpretations and perceptions that interact with traits such as general privacy attitudes [46; 50; 52]. For example, people make inthe-moment, context-driven decisions about whether to lie about their location on social media based on factors such as their current physical distance from another user [22]. We argue that, in order to understand the nature of privacy lies, we have to look into the motivations that drive them in a more nuanced way than simply the general goal of protecting privacy or data. According to Westin s taxonomy of privacy functions [69], there are at least four main privacyrelated motivations: autonomy, the absence of manipulation by others; self-evaluation, a safe space to reflect on feelings and identity free from the threat of social judgment; emotional relief, the ability to deviate from social norms and expectations; and limited and protected communication, the ability to dictate intimacy and boundaries with interaction partners. These different conceptualizations and functions of privacy are lost if online PPBs are considered through the lens of protecting informational privacy alone. As with perceived costs and benefits, motivations also likely vary by context. Recent research on context and motivations in disclosure suggests that contextual factors such as audience representations in social media platforms amplify different types of disclosure motivations, which, in turn, help explain online disclosure decisions [3; 12]. Although this line of research has focused on disclosure attributes other than truthfulness, we see its insights as likely to apply to decisions around privacy lies as well. Further complicating matters, relative to the common decision in privacy work to focus on either systems or people, is that many online contexts raise interpersonal and system-oriented considerations simultaneously. Decisions to provide truthful information in a Facebook profile, for instance, affect both what Facebook knows about you and how others perceive you. This doesn t mean that both are always salient. For example, Young et al. found that on balance, college students were concerned about protecting their social privacy on Facebook but not their institutional privacy, i.e., data collected by the platform [74]; Felt, Egelman and Wagner found similar sentiments for privacy concerns in mobile applications [17]. Specific design decisions in a system s interface can have major impacts in how people perceive context. For instance, design features such as perceived anonymity and availability of social cues can affect people s risk/benefit calculus, and consequently, their privacy concerns [30]. In addition to the macro context, research suggests that the specific interaction partner matters [48]. In general, people are more likely to provide information to partners they trust [32] and are familiar with [74]. Characteristics of the requestor also matter in commercial contexts, where decisions to disclose information to websites are based on factors such as regard for the company and trust in the website [44]. The nature of the specific request is also important. People are more likely to disclose information to websites when they see the request as relevant to the situation [75], fair, and not invasive [54]. Similarly, people draw on a range of privacy rules when making decisions about disclosure in interpersonal exchanges, where the nature of the request, including the type of question asked, its depth, and its appropriateness, matter [52]. Overall, this literature positions context itself as a malleable rather than a fixed property, to which different people may assign different meanings, amplifying certain goals, concerns, and elements while disregarding others. This complicates the relationship between motivations, disclosure truthfulness, and context, making it important to look at how motivations manifest in and depend on specific contexts. Together, these findings give rise to the following two research questions: RQ2: What are people s motivations for telling privacy lies to people and systems? In what situations do they arise and what specific privacy functions do they serve? RQ3: How do contextual factors, such as people s perceptions of both information requesters and requests, influence people s decisions to tell privacy lies?

4 How Can Non-Liars Teach Us About Privacy Lies? The prior research questions focus on decisions about lying and how context may affect these decisions, but some people choose not to tell privacy lies. We believe studying these non-users [2] of privacy lies as a PPB could also be revealing. Based on prior work, we foresee three individuallevel characteristics that may drive people to not tell privacy lies. First, some people may simply be less worried about their online privacy than others [59] and thus may not engage in PPBs, including privacy lies. Second, people may develop a sense of learned helplessness when faced with repeated privacy violations online [61], making them less likely to attempt to protect their privacy by lying. Third, people may have moral reasons for not engaging in privacy lies. Some users who tested a differential privacy solution felt that obscuring or fuzzing their information was unethical [9], and moral beliefs are inversely related to misrepresenting oneself in interpersonal interactions online [30]. However, although lying is often considered immoral, identity concealment to support privacy is viewed as a relatively acceptable form of deception [67]. Thus, privacy lies may also be seen as acceptable. These observations lead to our final research question: RQ4: What are the reasons people do not tell privacy lies? METHOD To address these questions, we collected both quantitative and qualitative data about people s privacy lying behavior and attitudes, their concerns around and willingness to share personal data, and their views and experiences around privacy in different online contexts. Procedure We collected the data through a survey of Amazon Mechanical Turk (MTurk) workers that invited them to participate in a study on online behaviors and attitudes. After giving consent, participants were first asked for demographic information in case later exposure to information on privacy lies would influence them to lie about such data. Participants were then asked about their general willingness to disclose various kinds of data online and their privacy-related experiences and behaviors. We then presented participants with a short tutorial on privacy lies, adapted from another study on deception [24], to both walk participants through the definition of privacy lies and to reduce the stigma of admitting to socially unacceptable behavior. We reassured participants that we did not view lies as good or bad, but were simply interested in examining an important part of human communication. We kept the definition of privacy lies broad ( providing false information about yourself online to protect your privacy ) so as to not limit notions of privacy, privacy goals, and contexts in which participants had privacy concerns. To progress to the remainder of the survey, participants had to correctly answer a 2-item quiz to distinguish privacy lies from other forms of deception; they received feedback on incorrect answers, which they could then correct. After passing the quiz, participants were asked whether they had ever told a privacy lie online. Those who had told privacy lies were then asked whether they had told these lies to people in interpersonal contexts or directly to websites or other devices where another human was not directly involved, then to describe a detailed example of when and why they had told a privacy lie to a person and/or a system. Participants who reported not having told privacy lies were asked to explain their reasoning in an open-ended response. All participants then answered questions about their privacy concerns and attitudes, as well as their perceptions of the prevalence, morality, and effectiveness of privacy lies based on hypothetical scenarios describing privacy lies to people and systems. The scenarios and questions are available as supplemental material in the ACM digital library. We first piloted the survey with a student sample (N=10) to refine questions. After refinement, the final survey was posted on MTurk at various times during the morning, afternoon, and night on multiple days to gain variation in the sample. We restricted the survey to MTurkers located in the United States. Since the survey took the first 20 MTurk participants an average of 12 minutes to complete, we compensated participants $1.50 to comply with U.S. federal minimum wage standards. Participants Of 409 respondents, we removed 34 who failed the attention check at the end of the survey and 19 whose responses did not fit the definition of privacy lies. Of the remaining 356 participants, 54% were male and 82% identified as Caucasian. The average age was 34 years. On average, participants estimated that they used the Internet for 7.6 hours a day. Most reported having some college education or higher (87%) and being employed full-time (68%), as well as having worked on MTurk for over 1 year (66%). Only 23% of participants reported never having told a privacy lie, and 18% told them rarely, whereas 41% told them sometimes, and 18% told them often or all the time. Measures Frequency of Privacy Lies Frequency of telling privacy lies was computed from two items: first, participants were asked if they ever told privacy lies (yes/no); participants who selected yes were asked to rate the frequency with which they tell privacy lies. These two items were combined into a 5-point scale (never, rarely, sometimes, often, all the time). Privacy-Related Views To measure privacy-related views, we used several scales: a 2-item Trust of the Internet scale, α=.77 [65]; a 5-item Perceived Control of Data scale, α=.86 [72]; and a 10-item Users Information Privacy Concerns scale, α=.79 ([42], changing online company to online party ). We also asked about participants Willingness to Disclose Online for each of 9 personal data points (name, age, gender, sexual orientation, birth date, address, location, browsing history, and content of online messages), adapting this

5 Control variables Privacy-related views Actual privacy-related experiences and behaviors Individual Reduced Model Full Model Variables Adj. R 2 Coeff. S.E. Coeff. S.E. Age Gender (Female as reference category) < Trust of the Internet.036** Perceived Control of Data.040** -.162* Users Informational Privacy Concerns.142** Willingness to Disclose Online.075** -.219* *.070 Number of PPBs.096**.139** **.037 Freq. of being a Privacy Victim Freq. of Privacy-related News.049** Freq. of Privacy-concerning Situations.039** Attitudes Attitudes about Privacy Lies.275**.463** **.053 Table 1. Values for the full model (R 2 =.37; adjusted R 2 =.35), the reduced model (R 2 =.36; adjusted R 2 =.35), and individual predictors (controlling for age and gender) predicting frequency of telling privacy lies (N=356). *Significance is indicated by * for p <.05 and ** for p <.001. measure from previous privacy studies [23; 53]. We summed the number of data points they were willing to disclose, ranging from 0 to 9. Actual Privacy-Related Behaviors and Experiences We adapted binary items used in prior work to gauge participants use of PPBs [65], including whether they used do not track plugins, virtual private networks (VPNs), invisible browsing, ad blockers, and secure passwords, as well as whether they regularly cleared browser cookies, controlled privacy settings on social network sites, and read app and website privacy policies. We summed the number of PPBs participants engaged in, ranging from 0 to 8. We measured privacy experiences with three 7-point bipolar items: how often they had personally been the victim of a privacy violation in the past (Freq. of Privacy Victim), how frequently they had seen or heard about online privacy violations in the past year (Freq. of Privacy-related News) used in Smith et al. [62], and an original item measuring their perceived frequency of coming across privacy-concerning situations online, with anchors of 1= Never and 7= All the time (Freq. of Privacy-concerning situations). Attitudes about Privacy Lies Based on prior work that uses hypothetical scenarios to measure attitudes about lying [43], we presented participants with two short scenarios of lies to people and to systems online. They rated each scenario on three original 7-point bipolar items about the degree to which they perceived privacy lies to be common, ethical, and effective in protecting privacy. Since principal components analysis extracted one factor for the six items (measuring lies to both people and systems), we computed a variable that represents people s overall attitudes about privacy lies, α=.82. RESULTS Our results are divided into three sections. First, we put forth a model that accounts for the individual characteristics that predict lying as a PPB, with the goal of understanding factors beyond privacy concerns that account for this behavior (RQ1). Then, we explain the results of our thematic analysis of privacy lie examples that shed light on various privacy goals, functions, and contextual factors underlying the decision to tell privacy lies in person and system contexts (RQ2 and RQ3). Finally, we present the results of our thematic analysis of the reasons why people do not tell privacy lies to understand these non-use behaviors and to reveal hidden factors that might be at play (RQ4). RQ1: Predicting Privacy Lies Correlations between all variables ranged from <.001 to.35, except for between privacy concerns and attitudes about privacy lies (r=0.54). We ran a test for multicollinearity using the mctest package in R, and the highest variation inflation factor (VIF) was 1.79 (for privacy concerns). Based on the relatively low VIF values, we retained all variables in the analyses without concern for multicollinearity. We then ran a general linear model that included 11 variables (9 predictor and 2 control variables) with frequency of lying as a continuous dependent variable. Using a stepwise regression procedure, variables were deleted one at a time based on largest p-value. Likelihood ratio tests were then run to compare the reduced model with the full model until removing a variable led to a significant difference between models. The beta coefficients, standard errors, and p-values of the reduced and full models are reported in Table 1. We also computed models for each individual predictor, controlling for age and gender; adjusted r-squared values for those models are also shown in Table 1.

6 Controlling for age and gender, frequency of privacy lies in the reduced model was predicted by a) perceived control of data, b) general willingness to disclose online, c) the number of other PPBs people engage in online, and d) attitudes about privacy lies. Perceived control of data and general willingness to disclose online were negatively associated with privacy lies; the number of PPBs and attitudes about privacy lies were positively related to the frequency of privacy lies. Together, these four factors explained 35% of variance, whereas a model with privacy concerns only explained 14% of the variance. Privacy concerns was not a significant predictor in the full or reduced models that included the above-mentioned factors. Frequency of being a victim of a privacy violation did not predict the likelihood of telling privacy lies. The frequencies of reading about privacy violations in the news and coming across privacy-concerning situations online were significantly related to frequency of privacy lies taken individually, but were no longer significant in either the full or reduced models. Finally, attitudes about privacy lies (in terms of their prevalence, morality, and effectiveness) were the strongest predictor of lie frequency. Overall, the reduced model provides a parsimonious explanation of individual-level characteristics perceived control of data, general willingness to disclose online, use of other PPBs, and attitudes about privacy lies that predict frequency of engaging in privacy lies. RQ2 and RQ3: Context and Motivations for Lying The model explains about one third of the variance in the frequency of telling privacy lies, suggesting that there are other factors to uncover. Thus, we turn to an investigation of contextual factors that may influence privacy lies: the reasons people have for telling privacy lies, and how these are influenced by their perceptions of the information request and the requestor in both person and system contexts. To do this, we looked at the open-ended responses from 275 participants who reported telling privacy lies. Overall, 13% of these participants had told such lies only to people, 38% had told only told them to systems, and 51% had told both system and people lies. We report on the themes that emerged from analyzing 175 person lies and 236 system lies. Two members of the research team open-coded the first 75 examples of each set, at which point we reached code saturation and then iterated. We found that participants often provided multiple reasons for telling any given privacy lie, so we allowed for multiple overlapping codes. Ultimately, we developed a framework with four main themes comprised of 11 subcodes, shown with subcode frequencies in Table 2. Those themes and subcodes were used to code the remainder of the dataset of lies to people (Cohen s kappa=.70) and lies to systems (Cohen s kappa=.68). The first two themes involve people s perceptions of the information request and the requesting party, while the second two themes represent Themes # Subcodes Person System Judgments Unneeded about the (8.7%) (21.1%) request for Inappropriate/ information Discomfiting (27.3%) (14.6%) 45 8 Perceptions 3 Unfamiliarity (24.6%) (3.2%) of the Requestor 4 Distrust (8.2%) (11.3%) 5 Gaining a benefit (1.1%) (61.5%) Lies for Exploring a Gain persona (15.3%) (10.5%) 7 Privacy for privacy s sake (8.2%) (8.1%) 8 Avoiding harm in general (34.4%) (21.9%) Avoiding offline Lies of repercussion (35.5%) (8.9%) Avoidance Avoiding communication (16.4%) (26.3%) 11 Avoiding 54 0 misuse of data (21.9%) Table 2. Breakdown of main themes in examples of privacy lies in interactions with people (n=175) and systems (n=236). Note that lies could exhibit multiple themes; thus, percentages total over 100%. people s motivations to gain or avoid a particular outcome. Below, we discuss each theme in turn. 1. Judgments about the request for information: Many participants expressed strong opinions about the request for information. A common reason to tell a privacy lie was the perception that the data requested was unneeded (Subcode 1: Unneeded), more so in interactions with systems (21.1%) than with people (8.7%). Participants voiced frustration that requests from systems were often unwarranted and not necessary to know (P23) for the purposes of the interaction, such as a birthdate for a simple registration (P51). Research indicates that consumers are more likely to disclose their information to companies if they feel they are being treated fairly [63]; our findings suggest that a perception of unfairness can also motivate people to tell privacy lies. Such perceptions of unfairness also sometimes elicited emotional reactions in comments such as they don t deserve to know (P34), and it s none of their business (P73). Participants often reported that the requests for information were not just unneeded, but also uncomfortable (Subcode 2: Inappropriate/Discomfiting), here more so when lying to people (27.3%) than systems (14.6%). Comments from these participants suggest they wanted control over who got to see their personal information; privacy lies were a way that they could avoid very, very personal questions (P51) they saw as inappropriate, particularly during interactions with relative strangers who made them feel uncomfortable. People also told privacy lies in response to invasive (P30) requests from systems, such as P170: I use a false social media persona I ve set up, to avoid giving systems access to my

7 genuine accounts. I ve dedicated Twitter and Facebook accounts to deal with this nonsense. They also wanted to provide information of their own volition rather than be inundated by requests, as voiced by P82, I enjoy giving the info I want myself without being interrogated. 2. Perceptions of the Requestor: 24.6% of participants who told privacy lies to another person did so because they were interacting with someone they were relatively unfamiliar with on platforms such as Reddit, Facebook, dating websites, and online games (Subcode 3: Unfamiliarity). In some cases, they did not know or want to know the person at all; in others, did want to interact, but their partner overstepped personal boundaries: I was recently on a forum and had a man start talking to me. He seemed nice and was interested in the same thing I was. We were just having friendly conversations, then he started asking more personal information. I did not feel comfortable giving him that so I lied about my name but I did tell him my age (P70). These findings are in line with deception research that people are more likely to tell self-serving lies to people who are not well-known to them, since it would be harder to get away with telling such lies to people with whom they are familiar [70]. In contrast, unfamiliarity was rarely called out in privacy lies to systems (3.2%); instead, participants mentioned telling privacy lies to websites they used frequently. For instance, some Facebook users were concerned about both the other people who could view their data (P69) and the company itself: Most of my Facebook information is filled with privacy lies, I think Zuckerberg demands/resells too much information (P60). In both person (8.2%) and system (11.3%) contexts, perceived untrustworthiness could be the immediate trigger for telling a privacy lie (Subcode 4: Distrust). Given that trust in the requestor can be a powerful mediator between privacy concerns and eventual disclosure [31], we would have expected trust to occur more frequently in participants responses. This is, however, consistent with the statistical model, in which general trust of the Internet was found not to be significant. 3. Lies for Gain: A factor that was much more strongly tied to privacy lies in interactions with systems (61.5%) than people (1.1%) was the motive to gain some form of benefit (Subcode 5: Gaining a Benefit). These privacy lies mainly involved gaining access to services or information that required personal data during the signup process. Related to the Unneeded theme, participants would sometimes assess which information they thought was truly needed to accomplish their gains, being truthful about those elements while lying about parts that they deemed unnecessary: Recently a website who doesn t need my birth date, requested it. I give the correct year, but lied about the month and day in order to protect my privacy. This information shouldn't be asked for a simple registration. I agree if they want to see if I m over 18 (21) they could ask for my birth year, but not month and day (P51). Some participants told privacy lies to anonymously try out an alternate identity (Subcode 6: Exploring a Persona). This was relatively common in interactions with both people (15.3%) and systems (10.5%). For example, P20 lied about his age and gender, saying I wanted to change people s perspective of me and to make sure I couldn t be identified. Others told privacy lies to be able to engage in stigmatized activities; for example, P64 misrepresented himself on a marijuana forum and P134 lied on a sex chat site to avoid being identified and embarrassed, while P78 provided false information to a pornographic website, stating Given that there are but a couple of people who I can talk freely about topics such as this, and that it is a taboo subject in our culture, I d rather not disclose [my] information. People told similar lies during direct interactions with people, for example, when expressing an unpopular political opinion (P78). In Westin s taxonomy of privacy functions [69], such lies would serve the purpose of emotional release by allowing people a private way to deviate from social norms and rules. The final subcategory in the lie for gain category was what we conceptualized as privacy for privacy s sake, which was cited just over 8% of the time for both person and system lies (Subcode 7: For Privacy s Sake). Comments from these participants included statements about their identities or emotions, such as I m a bit secretive person (P177) and I was feeling very private (P16). These participants seemed to value their privacy regardless of whether they perceive an additional benefit or negative consequence from revealing their information. For example, P84 stated: I was uncomfortable using my real information, even though I felt reasonably confident that the person online would not personally do any damage with the information. 4. Lies of Avoidance: Many participants were concerned with avoiding undesired consequences in all interactions, which emerged as another major category for engaging in privacy lies with both people (34.4%) and systems (21.9%) (Subcode 8: Avoiding General Harm). Such concerns might entail avoiding unwanted attention (P66), fraud or identity theft (P30), or harassment (P163). During interactions with people, participants were especially worried about offline repercussions such as being stalked, and consequently often lied about their location (35.5%), while offline repercussions of systems collecting data were much less salient (8.9%) (Subcode 9: Avoiding Offline Repercussions). People also lied to avoid further communication with people (16.4%) and systems (26.3%) (Subcode 10: Avoiding Communication). With people, privacy lies served to stop unwanted communication altogether, or (as with Inappropriate requests) to avoid a line of questioning that was perceived to be invasive while remaining in contact (P162). In the latter case, lies were a useful way to assert personal boundaries. With systems, avoiding communication mainly involved telling privacy lies to avoid spam, often by

8 giving fake addresses, so I can still investigate the offers but am not bothered by solicitations that typically follow (P273). Finally, 21.9% of lies to systems were triggered by concerns about data management and reuse (Subcode 11: Avoiding Misuse of Data). These participants were often less concerned about the initial request than what may happen to their data later: If for some reason the information is compromised I do not want it to be extremely easy for someone to find me and figure out who I am (P196). In contrast, people did not mention concerns about third party sharing in their responses about privacy lies to people at all. RQ4: Reasons to Not Lie We also sought to understand the reasons for not engaging in privacy lies through a thematic content analysis of responses from 91 participants who reported never telling privacy lies. We developed a framework of reasons based on open coding the first 25 reasons to not tell privacy lies, at which point we reached code saturation. We found that most participants provided exactly one reason for not telling privacy lies, so we used a mutually exclusive coding scheme for these responses. Two coders coded the responses according to our framework (Cohen s kappa=.69); all disagreements were resolved through discussion. Our findings can be organized into four main categories (Table 3), two of which cast lying as unnecessary, and two of which cast lying as bad. The most common reason people gave for privacy lies being unnecessary was that they did not feel a need to protect their privacy online through any PPB. These participants had very little to hide (P61, P145) or were like an open book (P229). One participant drew an analogy to people who do not have the option to remain private in public spheres, stating Famous people have to let all their information hang out there in the public, essentially that is, most of their information is known, so if they can do it I can do it (P160). Some of them believed that no damage could come from making their personal information available online, stating I have nothing of value in my name that someone could benefit from if they stole my identity (P184), or I don t feel a threat that is tangible from exposing this information (P45). Other participants rarely came across what they believed to be unwarranted requests for personal information: Most of the times I needed to use my personal information it has been for very necessary reasons (P80). It s possible that some of these participants would be more willing to lie for privacy reasons if they encountered services that asked for unneeded information, though their threshold for determining whether an information request is warranted may be different compared to those who do engage in privacy lies. Another reason privacy lies could be unneeded is reliance on other PPBs, as reported by about one-fifth of non-liars. Instead, omission was a common strategy in the face of privacy threats, where participants would simply refrain from giving the information as opposed to giving false information (P126). In some cases, these participants may Reasons for Not Telling Privacy Lies Frequency Unneeded 41 (45%) Preference for another PPB 19 (21%) Immoral/Unethical 20 (22%) Could have negative repercussions 11 (12%) Table 3. Reasons given by non-liars (n=91) for not telling privacy lies (percentages total to 100%) compromise, providing some information but omitting the rest: I sometimes omit things such as my exact birthday, such as only putting month and year or just month or just year (P357). However, sometimes certain data points cannot be omitted because they are required to access online services. In such cases, participants either choose not to sign up for the service (P357), to avoid the website altogether (P176), or only use websites that they trust (P86). Similarly, when communicating with an individual, participants like P342 would probably just stop talking to them or not answer, or find a way to circumvent the question. Other PPBs reported by participants included secure browsing (P132) or privacy settings to ensure their information was restricted to only a few people (P153). The other main general theme reflected the negative view on lying in general. For about one-fifths of our participants, decisions about privacy lies were first and foremost a moral issue. These participants saw it as taking on a fake identity (P4) and viewed themselves as truthful people, stating that they prefer to be honest (P79). They also disliked lying in general regardless of motivation, viewing it as morally wrong (P312) or citing religious reasons, such as P344: The Bible says not to lie so I try not to. Whether we justify them with one thing or another, it s still wrong. P270 was specifically concerned about the personal impact of privacy lies: If I lied about myself online I would feel a sense of shame that I don t think I would be able to shake. In fact, some participants who did lie often offered partial truths for example, saying they lived in a neighboring town perhaps to balance privacy concerns with moral reservations. Finally, a smaller number of participants saw lying not as intrinsically bad, but as a bad idea because privacy lies could have negative consequences: Telling lies online can lead to a cascade of problems if someone decides to try and dig deeper into my personal history (P154), especially if you end up becoming friends with the person over time (P289). This reasoning has some parallels to deception in online dating, where people will only tell small lies to help manage social constraints so as not to adversely affect potential future interactions [64]. Participants also worried about getting in trouble or banned (P48) for providing false information in various online contexts, particularly if the falsities didn t line up properly (P330). Some people saw maintaining consistency with and remembering privacy lies as too much effort: If I provide lies online, I would have to provide a different answer to each situation. I would then have to remember those details if I want to use these websites in the future. That requires a lot of effort. I decided that the

9 benefit of doing this is not worth the cost (P115), although several people who did tell privacy lies managed this by using fake identities where they provided false information consistently across websites. DISCUSSION In the following sections, we discuss the implications of our results for privacy research and design. Implications for Privacy-Related Measures Our findings support the need to go beyond self-reported privacy concerns and to measure privacy without asking about it directly [7]. The predictive model captured just over one-third of the variance in telling privacy lies; however, self-reported privacy concerns were not significant in this model. These findings align with research that people who report high privacy concerns may not actually act in a privacy-protective manner [8; 47]. Non-liars responses were interesting in this regard: in the thematic content analysis, almost half of their responses were about lying, or PPBs in general, being unnecessary but their quantitative responses about privacy concerns were still above 5 on a 7-point scale. This suggests that explicit questions about privacy concerns might pose a social desirability, experiment demand characteristic, or priming bias, and a corresponding need for less direct measurements of privacy concerns. For instance, the actual use of non-lying PPBs was a significant predictor for telling lies, probably because this identifies people who were more willing and able to translate concerns into concrete PPBs. Questions about PPBs might also have a smaller effect on priming people to be concerned about their privacy versus explicit questions about privacy concerns. Our study also indicates a need to understand people s attitudes about specific PPBs when studying how their privacy concerns map onto their protective responses. Although only about 20% of non-liars explicitly cited moral concerns as their main reason for not lying, the predictive model shows that people s attitudes about privacy lies explained more variance than any other variable alone. Based on our qualitative analysis, we suspect that attitudes about (particular forms of) deception are important to consider in studying privacy lies and PPBs, as with Bullek s finding that some people regard differential privacy solutions that obscure data as immoral [9]. Designs could target these attitudes about deception, framing PPBs as more or less deceptive or socially normative in an effort to encourage or discourage particular PPBs depending on the design goals at hand. The predictive model also showed that higher perceived control of data was associated with lower frequency of privacy lies. Research on the privacy control paradox has shown that perceptions of informational control can make people more likely to disclose sensitive information [6] and more likely to both engage in risky behaviors and ignore riskrelated information [56]. Our results suggest that the privacy control paradox extends to privacy lies as well; there may be value in designs that help people reflect on how much control they have over their data. Consider, for instance, a privacy nudge [68] that shows not just friends but also unknown people who might see a Facebook post based on its privacy setting. From Data Control to Privacy Goals The prior finding highlights a danger for individuals focused on control over their data. We suggest that common research framings of privacy as control over data and preventing information loss may also be harmful, because those framings can lose sight of the range of goals served by privacy (c.f., [69]). For example, participants reported telling privacy lies to be able to explore an identity within a safe space (such as sexual orientation), in line with Westin s concept of self-evaluation, while others told lies to vent or to explore socially unacceptable opinions without social censure, in line with Westin s conceptualization of privacy as an emotional release. The goals of these privacy lies fit well with arguments that individuals need a backstage where they can safely explore ideas [52]. People also told privacy lies to limit their communication to specific audiences, in line with Westin s privacy function of protected communication, and to assert their freedom from external manipulation, in line with Westin s privacy function of autonomy. Although all of these motivations can be expressed in terms of control over information, we see such control more as a means, rather than an end and considering how people think about these ends is likely to be fruitful for better understandings of privacy and privacy lies. Consider the case of unneeded/inappropriate requests for information, which featured in about one-third of participants examples of privacy lies. Generally, participants were less worried about losing information than they were that the request was appropriate in the context of the interaction. When they judged that it was not, as when a person requested information that was too intimate or a system requested information that was not needed, participants used privacy lies to not just protect privacy but also to assert autonomy. This aligns with Fuster s argument that providing inaccurate information online allows for the preservation of the informational autonomy of individual[s] in the face of unprecedented levels of data collection that offers them few other forms of recourse [18]; here, too, the protection of information is a means toward the function of autonomy. Going a step further down this path, it might be more fruitful to move from thinking about privacy functions to thinking about functions more generally, and how PPBs support them. Consider Hecht et al. s paper on how people use the location field in Twitter profiles, which highlighted a number of reactions to providing location information ranging from commentary on the need for such information ( NON YA BISNESS!! ) to self-expression and playfulness [25]. Analyzing these data purely from a privacy and information

Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media

Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media Xinru Page School of Information and Computer Sciences University of California, Irvine Irvine, CA 92697 USA

More information

Understanding User Privacy in Internet of Things Environments IEEE WORLD FORUM ON INTERNET OF THINGS / 30

Understanding User Privacy in Internet of Things Environments IEEE WORLD FORUM ON INTERNET OF THINGS / 30 Understanding User Privacy in Internet of Things Environments HOSUB LEE AND ALFRED KOBSA DONALD BREN SCHOOL OF INFORMATION AND COMPUTER SCIENCES UNIVERSITY OF CALIFORNIA, IRVINE 2016-12-13 IEEE WORLD FORUM

More information

Introduction. Data Source

Introduction. Data Source Introduction The emergence of digital technologies including the Internet, smartphones, tablets and other digital devices has increased both the complexity of the core definition of this construct, the

More information

The University of Sheffield Research Ethics Policy Note no. 14 RESEARCH INVOLVING SOCIAL MEDIA DATA 1. BACKGROUND

The University of Sheffield Research Ethics Policy Note no. 14 RESEARCH INVOLVING SOCIAL MEDIA DATA 1. BACKGROUND The University of Sheffield Research Ethics Policy te no. 14 RESEARCH INVOLVING SOCIAL MEDIA DATA 1. BACKGROUND Social media are communication tools that allow users to share information and communicate

More information

Personal Data Protection Competency Framework for School Students. Intended to help Educators

Personal Data Protection Competency Framework for School Students. Intended to help Educators Conférence INTERNATIONAL internationale CONFERENCE des OF PRIVACY commissaires AND DATA à la protection PROTECTION des données COMMISSIONERS et à la vie privée Personal Data Protection Competency Framework

More information

Online Identity By CommonLit Staff 2014

Online Identity By CommonLit Staff 2014 Name: Class: Online Identity By CommonLit Staff 2014 Consider the different ways we express our identity, especially in the new age of technology. The Internet has heavily shaped our notion of identity.

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework INTERNATIONAL STANDARD ISO/IEC 29100 First edition 2011-12-15 Information technology Security techniques Privacy framework Technologies de l'information Techniques de sécurité Cadre privé Reference number

More information

Violent Intent Modeling System

Violent Intent Modeling System for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716

More information

Online Disclosure. Natalya N. Bazarova

Online Disclosure. Natalya N. Bazarova Online Disclosure Natalya N. Bazarova Bazarova, N. N. (2015). Online disclosure. In C. R. Berger & M. E. Roloff (Eds.), The International Encyclopedia of Interpersonal Communication. Hoboken, NJ: Wiley-Blackwell.

More information

Lesson 2: What is the Mary Kay Way?

Lesson 2: What is the Mary Kay Way? Lesson 2: What is the Mary Kay Way? This lesson focuses on the Mary Kay way of doing business, specifically: The way Mary Kay, the woman, might have worked her business today if she were an Independent

More information

Discovering Your Values

Discovering Your Values Discovering Your Values Discovering Your Authentic, Real Self That Will Drive Women Wild! Written By: Marni The Wing Girl Method http://www.winggirlmethod.com DISCLAIMER: No responsibility can be accepted

More information

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062 Computer Ethics Dr. Aiman El-Maleh King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062 Outline What are ethics? Professional ethics Engineering ethics

More information

An Integrated Expert User with End User in Technology Acceptance Model for Actual Evaluation

An Integrated Expert User with End User in Technology Acceptance Model for Actual Evaluation Computer and Information Science; Vol. 9, No. 1; 2016 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education An Integrated Expert User with End User in Technology Acceptance

More information

MMORPGs And Women: An Investigative Study of the Appeal of Massively Multiplayer Online Roleplaying Games. and Female Gamers.

MMORPGs And Women: An Investigative Study of the Appeal of Massively Multiplayer Online Roleplaying Games. and Female Gamers. MMORPGs And Women 1 MMORPGs And Women: An Investigative Study of the Appeal of Massively Multiplayer Online Roleplaying Games and Female Gamers. Julia Jones May 3 rd, 2013 MMORPGs And Women 2 Abstract:

More information

SOCIAL DECODING OF SOCIAL MEDIA: AN INTERVIEW WITH ANABEL QUAN-HAASE

SOCIAL DECODING OF SOCIAL MEDIA: AN INTERVIEW WITH ANABEL QUAN-HAASE KONTEKSTY SPOŁECZNE, 2016, Vol. 4, No. 1 (7), 13 17 SOCIAL DECODING OF SOCIAL MEDIA: AN INTERVIEW WITH ANABEL QUAN-HAASE In this interview Professor Anabel Quan-Haase, one of the world s leading researchers

More information

Understanding Privacy Decision- Making Using Social Exchange Theory

Understanding Privacy Decision- Making Using Social Exchange Theory Understanding Privacy Decision- Making Using Social Exchange Theory Jennifer King University of California Berkeley School of Information 102 South Hall Berkeley, CA 94720-4600 jenking@ischool.berkeley.edu

More information

Avoiding Enemies of Trust Common Behaviors that Inadvertently Damage Trust at Work 1 and How to Avoid Them

Avoiding Enemies of Trust Common Behaviors that Inadvertently Damage Trust at Work 1 and How to Avoid Them Avoiding Enemies of Trust Common Behaviors that Inadvertently Damage Trust at Work 1 and How to Avoid Them Enemies of Trust: Sincerity 1. Failing to update. Changing your mind about a decision or direction

More information

More Thinking Matters Too Understanding My Life Patterns

More Thinking Matters Too Understanding My Life Patterns Self Assessment From time to time I answer the questions below. I don t think long before I answer each one. I try to be quick and honest with myself. I think about the people I interact with the most

More information

019 My Wife Caught Me Looking at Porn, Now What?!?!

019 My Wife Caught Me Looking at Porn, Now What?!?! 019 My Wife Caught Me Looking at Porn, Now What?!?! Welcome to Pornfree Radio. I'm Matt Dobschuetz. This is the podcast for people who want to live 100% porn free. Today's episode is called, My Wife Caught

More information

The Finding Respect and Ending Stigma around HIV (FRESH) Study Intervention Post-Workshop Survey Community Participants

The Finding Respect and Ending Stigma around HIV (FRESH) Study Intervention Post-Workshop Survey Community Participants The Finding Respect and Ending Stigma around HIV (FRESH) Study Intervention Post-Workshop Survey Community Participants Date: / / Study ID Number: Thank you for participating in this study. Please fill

More information

Deconstructing Anger

Deconstructing Anger Deconstructing Anger October 10, 2015 If you ve ever watched a child learning how to walk, you ve noticed that at the very beginning it doesn t really know which muscles to use and which ones not to use.

More information

CEOCFO Magazine. Pat Patterson, CPT President and Founder. Agilis Consulting Group, LLC

CEOCFO Magazine. Pat Patterson, CPT President and Founder. Agilis Consulting Group, LLC CEOCFO Magazine ceocfointerviews.com All rights reserved! Issue: July 10, 2017 Human Factors Firm helping Medical Device and Pharmaceutical Companies Ensure Usability, Safety, Instructions and Training

More information

Call for Chapters for RESOLVE Network Edited Volume

Call for Chapters for RESOLVE Network Edited Volume INSIGHT INTO VIOLENT EXTREMISM AROUND THE WORLD Call for Chapters for RESOLVE Network Edited Volume Title: Researching Violent Extremism: Context, Ethics, and Methodologies The RESOLVE Network Secretariat

More information

Question Bank UNIT - II 1. Define Ethics? * Study of right or wrong. * Good and evil. * Obligations & rights. * Justice. * Social & Political deals. 2. Define Engineering Ethics? * Study of the moral issues

More information

Behaviors That Revolve Around Working Effectively with Others Behaviors That Revolve Around Work Quality

Behaviors That Revolve Around Working Effectively with Others Behaviors That Revolve Around Work Quality Behaviors That Revolve Around Working Effectively with Others 1. Give me an example that would show that you ve been able to develop and maintain productive relations with others, thought there were differing

More information

The Finding Respect and Ending Stigma around HIV (FRESH) Study Intervention Workshop Survey Community Participants

The Finding Respect and Ending Stigma around HIV (FRESH) Study Intervention Workshop Survey Community Participants The Finding Respect and Ending Stigma around HIV (FRESH) Study Intervention Workshop Survey Community Participants Date: / / Study ID Number: Thank you for participating in this study. Please fill out

More information

Disclosing Self-Injury

Disclosing Self-Injury Disclosing Self-Injury 2009 Pandora s Project By: Katy For the vast majority of people, talking about self-injury for the first time is a very scary prospect. I m sure, like me, you have all imagined the

More information

There have never been more ways to communicate with one another than there are right now.

There have never been more ways to communicate with one another than there are right now. Personal Connections in a Digital Age by Catherine Gebhardt There have never been more ways to communicate with one another than there are right now. However, the plentiful variety of communication tactics

More information

Grade 6: Creating. Enduring Understandings & Essential Questions

Grade 6: Creating. Enduring Understandings & Essential Questions Process Components: Investigate Plan Make Grade 6: Creating EU: Creativity and innovative thinking are essential life skills that can be developed. EQ: What conditions, attitudes, and behaviors support

More information

Identifying and Managing Joint Inventions

Identifying and Managing Joint Inventions Page 1, is a licensing manager at the Wisconsin Alumni Research Foundation in Madison, Wisconsin. Introduction Joint inventorship is defined by patent law and occurs when the outcome of a collaborative

More information

IAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER

IAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER IAB Europe Guidance WHITE PAPER THE DEFINITION OF PERSONAL DATA Five Practical Steps to help companies comply with the E-Privacy Working Directive Paper 02/2017 IAB Europe GDPR Implementation Working Group

More information

Twitter Secrets 7 Secrets To Mass Twitter Traffic Page 1

Twitter Secrets 7 Secrets To Mass Twitter Traffic Page 1 By Dave And Aaron www.mymarketinggoldmine.com Twitter Secrets 7 Secrets To Mass Twitter Traffic Page 1 Listen, We're Sick To Death of Seeing Money Hungry Border Line Criminals Who Want to Get Their Sticky

More information

Tough Questions and Answers

Tough Questions and Answers Ready Reference G-5 Tough Questions and Answers In reviewing these responses, remember that these are sample answers. Please do not rehearse them verbatim or adopt them as your own. They are meant to get

More information

1 Dr. Norbert Steigenberger Reward-based crowdfunding. On the Motivation of Backers in the Video Gaming Industry. Research report

1 Dr. Norbert Steigenberger Reward-based crowdfunding. On the Motivation of Backers in the Video Gaming Industry. Research report 1 Dr. Norbert Steigenberger Reward-based crowdfunding On the Motivation of Backers in the Video Gaming Industry Research report Dr. Norbert Steigenberger Seminar for Business Administration, Corporate

More information

Glasgow School of Art

Glasgow School of Art Glasgow School of Art Equal Pay Review April 2015 1 P a g e 1 Introduction The Glasgow School of Art (GSA) supports the principle of equal pay for work of equal value and recognises that the School should

More information

A Qualitative Research Proposal on Emotional. Values Regarding Mobile Usability of the New. Silver Generation

A Qualitative Research Proposal on Emotional. Values Regarding Mobile Usability of the New. Silver Generation Contemporary Engineering Sciences, Vol. 7, 2014, no. 23, 1313-1320 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49162 A Qualitative Research Proposal on Emotional Values Regarding Mobile

More information

6 Sources of Acting Career Information

6 Sources of Acting Career Information 6 Sources of Acting Career Information 1 The 6 Sources of Acting Career Information Unfortunately at times it can seem like some actors don't want to share with you what they have done to get an agent

More information

Indiana K-12 Computer Science Standards

Indiana K-12 Computer Science Standards Indiana K-12 Computer Science Standards What is Computer Science? Computer science is the study of computers and algorithmic processes, including their principles, their hardware and software designs,

More information

Success Mastermind. Defining Your Niche & Effective Messaging that Stands Out

Success Mastermind. Defining Your Niche & Effective Messaging that Stands Out Success Mastermind Defining Your Niche & Effective Messaging that Stands Out Have you ever wondered What programs should I offer? What should my free opt-in gift be? What words should I use on my home

More information

AP WORLD HISTORY 2016 SCORING GUIDELINES

AP WORLD HISTORY 2016 SCORING GUIDELINES AP WORLD HISTORY 2016 SCORING GUIDELINES Question 1 BASIC CORE (competence) 1. Has acceptable thesis The thesis must address at least two relationships between gender and politics in Latin America in the

More information

Online identity: A (non)propositional account. Francisco Yus University of Alicante

Online identity: A (non)propositional account. Francisco Yus University of Alicante Online identity: A (non)propositional account Francisco Yus University of Alicante francisco.yus@ua.es Seville, May 2016 The aims of my paper today is (1) To review briefly the proposal of extension of

More information

Negotiating Essentials

Negotiating Essentials Negotiating Essentials 1 Negotiating Essentials How to negotiate with your landlord about problems Being a tenant is not always easy for everyone. It is a situation that you sometimes have to deal with

More information

UML and Patterns.book Page 52 Thursday, September 16, :48 PM

UML and Patterns.book Page 52 Thursday, September 16, :48 PM UML and Patterns.book Page 52 Thursday, September 16, 2004 9:48 PM UML and Patterns.book Page 53 Thursday, September 16, 2004 9:48 PM Chapter 5 5 EVOLUTIONARY REQUIREMENTS Ours is a world where people

More information

Pan-Canadian Trust Framework Overview

Pan-Canadian Trust Framework Overview Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document

More information

NEW YORK STOCK EXCHANGE LLC OFFICE OF HEARING OFFICERS

NEW YORK STOCK EXCHANGE LLC OFFICE OF HEARING OFFICERS NEW YORK STOCK EXCHANGE LLC OFFICE OF HEARING OFFICERS NYSE Regulation, on behalf of New York Stock Exchange LLC, Complainant, Disciplinary Proceeding No. 2018-03-00016 v. Kevin Kean Lodewick Jr. (CRD

More information

SAMPLE INTERVIEW QUESTIONS

SAMPLE INTERVIEW QUESTIONS SAMPLE INTERVIEW QUESTIONS 1. Tell me about your best and worst hiring decisions? 2. How do you sell necessary change to your staff? 3. How do you make your opinion known when you disagree with your boss?

More information

Selling and Negotiation Skills

Selling and Negotiation Skills Selling and Negotiation Skills Jim Rohn s Eighth Pillar of Success: Part Four 2010 Jim Rohn International One-Year Success Plan 481 Week 34 Welcome to Week 34 of The Jim Rohn One-Year Success Plan. We

More information

CCG 360 o Stakeholder Survey

CCG 360 o Stakeholder Survey July 2017 CCG 360 o Stakeholder Survey National report NHS England Publications Gateway Reference: 06878 Ipsos 16-072895-01 Version 1 Internal Use Only MORI This Terms work was and carried Conditions out

More information

Computer Usage among Senior Citizens in Central Finland

Computer Usage among Senior Citizens in Central Finland Computer Usage among Senior Citizens in Central Finland Elina Jokisuu, Marja Kankaanranta, and Pekka Neittaanmäki Agora Human Technology Center, University of Jyväskylä, Finland e-mail: elina.jokisuu@jyu.fi

More information

HERE S WHAT I M GOING TO TEACH YOU

HERE S WHAT I M GOING TO TEACH YOU 2 HERE S WHAT I M GOING TO TEACH YOU Have you been struggling to find a way to build your very own business on the Internet? If you re like me (and countless other people around the world) you ve likely

More information

Leibniz Universität Hannover. Masterarbeit

Leibniz Universität Hannover. Masterarbeit Leibniz Universität Hannover Wirtschaftswissenschaftliche Fakultät Institut für Wirtschaftsinformatik Influence of Privacy Concerns on Enterprise Social Network Usage Masterarbeit zur Erlangung des akademischen

More information

Managing Difficult Conversations: Quick Reference Guide

Managing Difficult Conversations: Quick Reference Guide Managing Difficult Conversations: Quick Reference Guide About this guide This quick reference guide is designed to help you have more successful conversations, especially when they are challenging or difficult

More information

User Experience Questionnaire Handbook

User Experience Questionnaire Handbook User Experience Questionnaire Handbook All you need to know to apply the UEQ successfully in your projects Author: Dr. Martin Schrepp 21.09.2015 Introduction The knowledge required to apply the User Experience

More information

PublicServicePrep Comprehensive Guide to Canadian Public Service Exams

PublicServicePrep Comprehensive Guide to Canadian Public Service Exams PublicServicePrep Comprehensive Guide to Canadian Public Service Exams Copyright 2009 Dekalam Hire Learning Incorporated The Interview It is important to recognize that government agencies are looking

More information

FIPPs Fair Information Practice Principles

FIPPs Fair Information Practice Principles FIPPs Fair Information Practice Principles T H E G O L D S TA N DA R D F O R P R OT EC T I N G P E R S O N A L I N F O R M AT I O N Learning Objectives Recognize the Fair Information Practice Principles

More information

10 Ways To Be More Assertive In Your Relationships By Barrie Davenport

10 Ways To Be More Assertive In Your Relationships By Barrie Davenport 10 Ways To Be More Assertive In Your Relationships By Barrie Davenport Anna hates to rock the boat. Whenever her best friend Linda suggests a place for dinner or a movie they might see together, Anna never

More information

European Perspectives on Privacy in the Sharing Economy

European Perspectives on Privacy in the Sharing Economy Report from the EU H2020 Research Project Ps2Share: Participation, Privacy, and Power in the Sharing Economy European Perspectives on Privacy in the Sharing Economy Giulia Ranzini, VU Free University Amsterdam

More information

Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology

Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology Edited by Mireille Hildebrandt and Katja de Vries New York, New York, Routledge, 2013, ISBN 978-0-415-64481-5

More information

The Stop Worrying Today Course. Week 5: The Paralyzing Worry of What Others May Think or Say

The Stop Worrying Today Course. Week 5: The Paralyzing Worry of What Others May Think or Say The Stop Worrying Today Course Week 5: The Paralyzing Worry of What Others May Think or Say Copyright Henrik Edberg, 2016. You do not have the right to sell, share or claim the ownership of the content

More information

When the phone rings for you: how to handle the interview scheduling call

When the phone rings for you: how to handle the interview scheduling call When the phone rings for you: how to handle the interview scheduling call Many people view the ad-answering phase of a job search too narrowly, as if it were only a two-step process: 1) You answer the

More information

ENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS

ENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS BY SERAFIN BENTO MASTER OF SCIENCE in INFORMATION SYSTEMS Edmonton, Alberta September, 2015 ABSTRACT The popularity of software agents demands for more comprehensive HAI design processes. The outcome of

More information

Jun Zhang 1 School of Management, University of Science and Technology of China Hefei, Anhui, China ABSTRACT

Jun Zhang 1 School of Management, University of Science and Technology of China Hefei, Anhui, China ABSTRACT Regulate Privacy in SNS: Privacy Control on the Self-Ego Boundary and Dyadic-Boundary Chuang Wang School of Business Administration, South China University of Technology Guangzhou, Guangdong, China Jun

More information

Climate Asia Research Overview

Climate Asia Research Overview Climate Asia Research Overview Regional research study: comparable across seven countries The Climate Asia research was conducted in seven countries: Bangladesh, China, India, Indonesia, Nepal, Pakistan

More information

24 HOUR ANGER EMERGENCY PLAN

24 HOUR ANGER EMERGENCY PLAN 24 HOUR ANGER EMERGENCY PLAN Written by INTRODUCTION Welcome to IaAM S 24 Hour Anger Management Emergency Plan. This Emergency Plan is designed to help you, when in crisis, to deal with and avoid expressing

More information

GATEWAY TO LEVEL 2 EXCELLENCE IN SAFEGUARDING

GATEWAY TO LEVEL 2 EXCELLENCE IN SAFEGUARDING GATEWAY TO LEVEL 2 EXCELLENCE IN SAFEGUARDING An introduction to Safeguarding for Local Church Volunteers/Workers The Baptist Union of Great Britain Name.. Role..... Welcome and thank you This guide is

More information

Do You Want To Be Your Own Boss?

Do You Want To Be Your Own Boss? Do You Want To Be Your Own Boss? Your Online Money Making Search Ends Here Get answers for the Questions, why you need to be your own boss? Why online? and How to make money by blogging? St Paul Severe

More information

Name:- Institution:- Lecturer:- Date:-

Name:- Institution:- Lecturer:- Date:- Name:- Institution:- Lecturer:- Date:- In his book The Presentation of Self in Everyday Life, Erving Goffman explores individuals interpersonal interaction in relation to how they perform so as to depict

More information

Special Eurobarometer 460. Summary. Attitudes towards the impact of digitisation and automation on daily life

Special Eurobarometer 460. Summary. Attitudes towards the impact of digitisation and automation on daily life Summary Attitudes towards the impact of digitisation and automation on Survey requested by the European Commission, Directorate-General for Communications Networks, Content and Technology and co-ordinated

More information

THE INTERVIEW PITCH Techniques that Win

THE INTERVIEW PITCH Techniques that Win THE INTERVIEW PITCH Techniques that Win GREENBURGH PUBLIC LIBRARY PRESENTED BY LEW TISCHLER, THE BUSINESS DOCTOR JANUARY 26, 2017 This is why you want to pay attention: You want to win the interview! You

More information

Visual Art Standards Grades P-12 VISUAL ART

Visual Art Standards Grades P-12 VISUAL ART Visual Art Standards Grades P-12 Creating Creativity and innovative thinking are essential life skills that can be developed. Artists and designers shape artistic investigations, following or breaking

More information

INTERNET SAFETY. OBJECTIVES: 1. Internet safety what is true and what is false? 2. & Instant Messaging safety 3. Strangers on the Internet

INTERNET SAFETY. OBJECTIVES: 1. Internet safety what is true and what is false? 2.  & Instant Messaging safety 3. Strangers on the Internet LESSON 17 MIDDLE SCHOOL LESSON INTERNET SAFETY OBJECTIVES: 1. Internet safety what is true and what is false? 2. Email & Instant Messaging safety 3. Strangers on the Internet INDIANA STANDARDS (Grades

More information

Communication and Culture Concentration 2013

Communication and Culture Concentration 2013 Indiana State University» College of Arts & Sciences» Communication BA/BS in Communication Standing Requirements s Library Communication and Culture Concentration 2013 The Communication and Culture Concentration

More information

Social Virtual Reality Best Practices. Renee Gittins July 30th, 2018 Version 1.2

Social Virtual Reality Best Practices. Renee Gittins July 30th, 2018 Version 1.2 Social Virtual Reality Best Practices Renee Gittins July 30th, 2018 Version 1.2 1 Contents Contents 2 Introduction 3 Moderation Layers 3 Personal Moderation 3 Personal Moderation Tools 3 Personal Moderation

More information

RECLAIM YOURSELF GET BACK YOUR IDENTITY AND SELF-CONFIDENCE WHEN YOU VE LOST YOURSELF IN A RELATIONSHIP BASTIAAN & CHANTALLE BLIKMAN

RECLAIM YOURSELF GET BACK YOUR IDENTITY AND SELF-CONFIDENCE WHEN YOU VE LOST YOURSELF IN A RELATIONSHIP BASTIAAN & CHANTALLE BLIKMAN RECLAIM YOURSELF GET BACK YOUR IDENTITY AND SELF-CONFIDENCE WHEN YOU VE LOST YOURSELF IN A RELATIONSHIP BASTIAAN & CHANTALLE BLIKMAN Reclaim Yourself Copyright 2016 by Bastiaan & Chantalle Blikman/ Want2Discover.

More information

Semantic Privacy Policies for Service Description and Discovery in Service-Oriented Architecture

Semantic Privacy Policies for Service Description and Discovery in Service-Oriented Architecture Western University Scholarship@Western Electronic Thesis and Dissertation Repository August 2011 Semantic Privacy Policies for Service Description and Discovery in Service-Oriented Architecture Diego Zuquim

More information

Findings of a User Study of Automatically Generated Personas

Findings of a User Study of Automatically Generated Personas Findings of a User Study of Automatically Generated Personas Joni Salminen Qatar Computing Research Institute, Hamad Bin Khalifa University and Turku School of Economics jsalminen@hbku.edu.qa Soon-Gyo

More information

The Fear Eliminator. Special Report prepared by ThoughtElevators.com

The Fear Eliminator. Special Report prepared by ThoughtElevators.com The Fear Eliminator Special Report prepared by ThoughtElevators.com Copyright ThroughtElevators.com under the US Copyright Act of 1976 and all other applicable international, federal, state and local laws,

More information

Webinar Module Eight: Companion Guide Putting Referrals Into Action

Webinar Module Eight: Companion Guide Putting Referrals Into Action Webinar Putting Referrals Into Action Welcome back to No More Cold Calling OnDemand TM. Thank you for investing in yourself and building a referral business. This is the companion guide to Module #8. Take

More information

Circle Link 1 Online Rules of the Road

Circle Link 1   Online Rules of the Road 4 th Grade Scavenger Hunt Links Content Circle Link 1 http://www.commonsensemedia.org/get-cybersmart-phineas-and-ferb Online Rules of the Road 1. Guard your privacy. What people know about you is up to

More information

Learning Progression for Narrative Writing

Learning Progression for Narrative Writing Learning Progression for Narrative Writing STRUCTURE Overall The writer told a story with pictures and some writing. The writer told, drew, and wrote a whole story. The writer wrote about when she did

More information

THE AHA MOMENT: HELPING CLIENTS DEVELOP INSIGHT INTO PROBLEMS. James F. Whittenberg, PhD, LPC-S, CSC Eunice Lerma, PhD, LPC-S, CSC

THE AHA MOMENT: HELPING CLIENTS DEVELOP INSIGHT INTO PROBLEMS. James F. Whittenberg, PhD, LPC-S, CSC Eunice Lerma, PhD, LPC-S, CSC THE AHA MOMENT: HELPING CLIENTS DEVELOP INSIGHT INTO PROBLEMS James F. Whittenberg, PhD, LPC-S, CSC Eunice Lerma, PhD, LPC-S, CSC THE HELPING SKILLS MODEL Exploration Client-centered theory Insight Cognitive

More information

Visual Arts What Every Child Should Know

Visual Arts What Every Child Should Know 3rd Grade The arts have always served as the distinctive vehicle for discovering who we are. Providing ways of thinking as disciplined as science or math and as disparate as philosophy or literature, the

More information

Methodology for Agent-Oriented Software

Methodology for Agent-Oriented Software ب.ظ 03:55 1 of 7 2006/10/27 Next: About this document... Methodology for Agent-Oriented Software Design Principal Investigator dr. Frank S. de Boer (frankb@cs.uu.nl) Summary The main research goal of this

More information

RepliPRI: Challenges in Replicating Studies of Online Privacy

RepliPRI: Challenges in Replicating Studies of Online Privacy RepliPRI: Challenges in Replicating Studies of Online Privacy Sameer Patil Helsinki Institute for Information Technology HIIT Aalto University Aalto 00076, FInland sameer.patil@hiit.fi Abstract Replication

More information

Privacy as Impression Management

Privacy as Impression Management Institute for Software Research Privacy as Impression Management Sameer Patil patil@uci.edu Alfred Kobsa kobsa@ics.uci.edu ISR Technical Report # UCI-ISR-03-13 Institute for Software Research ICS2 210

More information

in the New Zealand Curriculum

in the New Zealand Curriculum Technology in the New Zealand Curriculum We ve revised the Technology learning area to strengthen the positioning of digital technologies in the New Zealand Curriculum. The goal of this change is to ensure

More information

IAASB Main Agenda (March, 2015) Auditing Disclosures Issues and Task Force Recommendations

IAASB Main Agenda (March, 2015) Auditing Disclosures Issues and Task Force Recommendations IAASB Main Agenda (March, 2015) Agenda Item 2-A Auditing Disclosures Issues and Task Force Recommendations Draft Minutes from the January 2015 IAASB Teleconference 1 Disclosures Issues and Revised Proposed

More information

Dr. Binod Mishra Department of Humanities & Social Sciences Indian Institute of Technology, Roorkee. Lecture 16 Negotiation Skills

Dr. Binod Mishra Department of Humanities & Social Sciences Indian Institute of Technology, Roorkee. Lecture 16 Negotiation Skills Dr. Binod Mishra Department of Humanities & Social Sciences Indian Institute of Technology, Roorkee Lecture 16 Negotiation Skills Good morning, in the previous lectures we talked about the importance of

More information

Drawing on young people s media literacy skills to explore gendered representations of science, technology, engineering and mathematics

Drawing on young people s media literacy skills to explore gendered representations of science, technology, engineering and mathematics Invisible Witnesses Drawing on young people s media literacy skills to explore gendered representations of science, technology, engineering and mathematics For over 30 years researchers have been trying

More information

FEE Comments on EFRAG Draft Comment Letter on ESMA Consultation Paper Considerations of materiality in financial reporting

FEE Comments on EFRAG Draft Comment Letter on ESMA Consultation Paper Considerations of materiality in financial reporting Ms Françoise Flores EFRAG Chairman Square de Meeûs 35 B-1000 BRUXELLES E-mail: commentletter@efrag.org 13 March 2012 Ref.: FRP/PRJ/SKU/SRO Dear Ms Flores, Re: FEE Comments on EFRAG Draft Comment Letter

More information

7 Tips for Outsmarting Your Addiction

7 Tips for Outsmarting Your Addiction 7 Tips for Outsmarting Your Addiction Do you ever try to convince yourself that things in your life aren t really how they seem to be? Do you tell yourself that things are better or worse than they actually

More information

The ALA and ARL Position on Access and Digital Preservation: A Response to the Section 108 Study Group

The ALA and ARL Position on Access and Digital Preservation: A Response to the Section 108 Study Group The ALA and ARL Position on Access and Digital Preservation: A Response to the Section 108 Study Group Introduction In response to issues raised by initiatives such as the National Digital Information

More information

Diseño y Evaluación de Sistemas Interactivos COM Affective Aspects of Interaction Design 19 de Octubre de 2010

Diseño y Evaluación de Sistemas Interactivos COM Affective Aspects of Interaction Design 19 de Octubre de 2010 Diseño y Evaluación de Sistemas Interactivos COM-14112-001 Affective Aspects of Interaction Design 19 de Octubre de 2010 Dr. Víctor M. González y González victor.gonzalez@itam.mx Agenda 1. MexIHC 2010

More information

Profiles of Internet Use in Adult Literacy and Basic Education Classrooms

Profiles of Internet Use in Adult Literacy and Basic Education Classrooms 19 Profiles of Internet Use in Adult Literacy and Basic Education Classrooms Jim I. Berger Abstract This study sought to create profiles of adult literacy and basic education (ALBE) instructors and their

More information

SAMPLE COURSE OUTLINE VISUAL ARTS ATAR YEAR 12

SAMPLE COURSE OUTLINE VISUAL ARTS ATAR YEAR 12 SAMPLE COURSE OUTLINE VISUAL ARTS ATAR YEAR 12 Copyright School Curriculum and Standards Authority, 2015 This document apart from any third party copyright material contained in it may be freely copied,

More information

INSPECTOR GENERAL U.S. DEPARTMENT OF THE INTERIOR

INSPECTOR GENERAL U.S. DEPARTMENT OF THE INTERIOR Unless otherwise noted all redactions are persuant to B(6) and B(7)(c) OFFICE OF INSPECTOR GENERAL U.S. DEPARTMENT OF THE INTERIOR REPORT OF INVESTIGATION Case Title BP Atlantis Reporting Office Energy

More information

National Core Arts Standards Grade 8 Creating: VA:Cr a: Document early stages of the creative process visually and/or verbally in traditional

National Core Arts Standards Grade 8 Creating: VA:Cr a: Document early stages of the creative process visually and/or verbally in traditional National Core Arts Standards Grade 8 Creating: VA:Cr.1.1. 8a: Document early stages of the creative process visually and/or verbally in traditional or new media. VA:Cr.1.2.8a: Collaboratively shape an

More information

Digital Citizenship Continuum

Digital Citizenship Continuum Digital Citizenship Continuum -curricular Competencies (Develop Thinking, Develop Identity and Interdependence, Develop Literacies, and Develop Social Responsibility) support student achievement and the

More information

School of Journalism and Communication, Chinese University of Hong Kong, Shatin, Hong Kong

School of Journalism and Communication, Chinese University of Hong Kong, Shatin, Hong Kong 792691ABSXXX10.1177/0002764218792691American Behavioral ScientistChen research-article2018 Article Revisiting the Privacy Paradox on Social Media With an Extended Privacy Calculus Model: The Effect of

More information

Keywords: Immediate Response Syndrome, Artificial Intelligence (AI), robots, Social Networking Service (SNS) Introduction

Keywords: Immediate Response Syndrome, Artificial Intelligence (AI), robots, Social Networking Service (SNS) Introduction Psychology Research, January 2018, Vol. 8, No. 1, 20-25 doi:10.17265/2159-5542/2018.01.003 D DAVID PUBLISHING The Relationship Between Immediate Response Syndrome and the Expectations Toward Artificial

More information